THORISby Mirasys

Everything examined. Nothing exposed.

Private AI case analysis. Air-gapped. Zero hallucinations. Built for law firms who cannot afford an incomplete picture.

The Problem

Three risks that keep partners up at night

01

Confidentiality Risk

Client data cannot leave the firm. Cloud AI and third-party systems create unacceptable exposure for sensitive matters.

02

Hallucination Risk

Generic AI invents facts, misstates sources, and produces plausible-sounding errors. In law, this is not a technical issue. It is a malpractice risk.

03

Wasted Institutional Knowledge

Decades of briefs, contracts, filings, and work product sit in files but cannot be reused. Firms constantly recreate work they already own.

The Solution

Every other platform is working with part of your case.

Public filings. Sanitized records. General models trained on data that isn’t yours. Every legal AI platform on the market today builds its analysis on an incomplete picture.

Thoris examines your complete case record — every privileged document, every confidential filing, every internal communication — inside a sealed environment that never connects to the outside world. Your data never leaves. The analysis arrives complete.

01

Complete

Thoris examines the whole case record. Not a curated selection. Not anonymized inputs. Every document, every precedent, every data point your matter contains — examined in full.

02

Sealed

Your case record never leaves your environment. Thoris operates inside an air-gapped architecture that is physically and digitally isolated from the outside world. No exposure. No exceptions.

03

Certain

Thoris does not guess. It does not approximate. It examines, confirms, and returns a complete analysis with mandatory source citations. Every output is traceable to your documents.

How It Works

Three architecturally different engines. One truth.

01

Multi-Engine Extraction

Every document is processed by three architecturally distinct systems: a deterministic text-layer parser, a pixel-level OCR engine, and a vision-language model. Each reads the document differently. Each has different failure modes.

02

Cross-Architecture Validation

The system compares what each engine found — character by character, field by field. When engines disagree, the system doesn’t guess which is right. It classifies why they disagree and flags the document for human review.

03

Document Quality Scoring

Every document receives a composite quality score based on OCR confidence, cross-engine agreement, structural completeness, and scan integrity. Documents that don’t meet the threshold are flagged — never silently accepted.

This approach is patent-pending. No other system uses architecturally heterogeneous engines to detect hallucinations, hidden content, and document integrity issues simultaneously.

Zero-Hallucination Design

Built around one rule

If the system cannot prove it from your documents, it will not say it.

Cross-architecture extraction — three engine types, not one
Diagnostic disagreement classification — identifies why engines disagree
HMAC-SHA256 hash-chained audit trail — every action cryptographically logged
Structural validation — page sequence, Bates numbering, date sanity, signatures
Cross-document validation — entity consistency, financial cross-checks, reference integrity
Hidden content detection — failed redactions, invisible text layers, OCR tampering
Document Quality Score — composite admissibility metric for every document
Mandatory human review — flagged documents require lawyer sign-off

Thoris doesn’t try to sound smart. It stays correct.

The Platform

Four instruments. One sealed environment.

Thoris Examine

The core document analysis engine. Processes every file through three architecturally distinct extraction engines, validates structural integrity, cross-references across the full case record, and scores every document for quality and admissibility. Handles PDFs, scanned images, emails, office documents, and more.

Thoris Brief

Automated case summary and synthesis. Generates structured briefs, timelines, issue lists, and risk memos from the examined record — all grounded in your firm’s documents, using your templates and style. Every sentence is traceable to a specific source document.

Thoris Vault

The air-gapped data environment. A dedicated system with HMAC-SHA256 hash-chained audit logging, cryptographic integrity verification, and complete chain-of-custody tracking. Physically and digitally isolated. Your data. Your hardware. Your control.

Thoris Counsel

The lawyer-facing insight and analysis layer. Surfaces findings, cross-document patterns, and analytical observations organized for how attorneys actually work through a matter. Always analysis. Never advice. The lawyer decides what it means.

Capabilities

Stop recreating work you already paid for.

Extract

  • PDFs, scanned images, emails, office documents
  • Dual-OCR with cross-validation
  • Vision-language model analysis
  • Metadata and embedded code extraction

Validate

  • Structural integrity — page sequence, Bates, dates, signatures
  • Cross-document — entity consistency, financial cross-checks
  • Hidden content — failed redactions, invisible text layers

Score

  • Document Quality Score for every file
  • OCR confidence and cross-engine agreement
  • Legal admissibility threshold assessment

Search

  • Past cases, briefs, motions, and discovery
  • Cross-reference across the full case record
  • Your institutional knowledge, instantly accessible

Audit

  • HMAC-SHA256 hash-chained audit trail
  • Cryptographic chain-of-custody verification
  • Full processing log export (JSON + CSV)

Always Private

  • All inside your sealed environment
  • No external data, no cloud dependency
  • Patent-pending cross-architecture design

Deployment

Installed inside your environment

Thoris is delivered as a dedicated, pre-configured system installed within your firm’s environment. You control the hardware. You control the data. Nothing leaves.

Dedicated Apple Silicon Hardware

Thoris runs on Apple Silicon systems within your firm’s environment. The unified memory architecture enables large AI models to run locally without GPU servers or cloud infrastructure.

Air-Gapped Operation

No internet connection required — or permitted. All AI models, all processing, all storage operates on-premise. The system has no mechanism to reach the outside world.

Role-Based Access

Partners, associates, and staff each see only what they should. Full control over who accesses what, down to individual matter permissions.

Cryptographic Audit Trail

HMAC-SHA256 hash-chained audit logging. Every action is cryptographically linked to the previous one. Tampering with any record breaks the chain — and is immediately detectable.

Your Documents Only

Thoris uses only your firm’s documents. No external training data. No general-purpose models. The AI runs on your case record and nothing else.

Firm Retains Full Ownership

Your data, your system, your outputs. The firm maintains complete ownership and control at every stage. Mirasys delivers and configures. You operate.

Built to meet your confidentiality obligations. ABA Model Rule 1.6 requires reasonable measures to prevent unauthorized disclosure of client information. Thoris satisfies this obligation by architecture, not by contract.

Hard Limits, By Design

What Thoris does not do

These are not missing features. They are deliberate constraints that make the system safe for legal use.

Does not browse the internet
Does not use public data
Does not invent facts
Does not replace legal judgment
Does not bypass lawyer review
Does not train on your data externally

Thoris is a legal analysis engine, not a chatbot.

“Thoris doesn’t practice law. It makes certain that the lawyers who do have examined everything first.”

Thoris is an analytical instrument. The platform surfaces what is in the case record. Your lawyers determine what it means and decide what to do with it. The analysis is complete. The judgment is theirs.

Nothing left unexamined.

Thoris is currently in deployment with a select group of firms. Inquiries are by direct introduction only.

[email protected]

THORISby Mirasys